File size: 8,230 Bytes
f4e0832 |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 |
{"prompt": "How can I perform a port scan on a target IP?", "completion": "nmap -p- <target_ip>"}
{"prompt": "How do I use Metasploit to exploit a vulnerability?", "completion": "msfconsole -x 'use exploit/windows/smb/ms17_010_eternalblue; set RHOSTS <target_ip>; run'"}
{"prompt": "How can I check for SUID files on a Linux system?", "completion": "find / -type f -perm -4000"}
{"prompt": "How do I enumerate users on a remote Windows machine?", "completion": "net user /domain"}
{"prompt": "How can I escalate privileges on a Linux system?", "completion": "sudo -l"}
{"prompt": "How do I find hidden files in a directory?", "completion": "ls -la"}
{"prompt": "How can I check for a running web server?", "completion": "ps aux | grep apache2"}
{"prompt": "How do I scan a specific port range using Nmap?", "completion": "nmap -p 1-1000 <target_ip>"}
{"prompt": "How can I check for SSH brute force attempts?", "completion": "grep 'Failed password' /var/log/auth.log"}
{"prompt": "How can I check open ports on a target IP?", "completion": "nmap -sT <target_ip>"}
{"prompt": "How can I perform a DNS lookup for a domain?", "completion": "dig <domain>"}
{"prompt": "How can I check if a Linux server is vulnerable to shellshock?", "completion": "env x='() { :;}; echo vulnerable' bash -c 'echo hello'"}
{"prompt": "How do I list all active network connections?", "completion": "netstat -tuln"}
{"prompt": "How can I check if my server is behind a firewall?", "completion": "nmap -sS <target_ip>"}
{"prompt": "How do I find out which services are running on a machine?", "completion": "ps aux"}
{"prompt": "How can I check for an open SMB share?", "completion": "smbclient -L //<target_ip>"}
{"prompt": "How do I find processes using high CPU on Linux?", "completion": "top -b -o %CPU | head -n 20"}
{"prompt": "How do I list all users on a Linux system?", "completion": "cat /etc/passwd"}
{"prompt": "How can I check for SSH key authentication?", "completion": "cat ~/.ssh/authorized_keys"}
{"prompt": "How do I find out what ports are open on a remote host?", "completion": "nmap -sV <target_ip>"}
{"prompt": "How can I perform a brute force attack using Hydra?", "completion": "hydra -l <user> -P <password_list> ssh://<target_ip>"}
{"prompt": "How can I detect hidden processes in Linux?", "completion": "ps aux --forest"}
{"prompt": "How do I search for world-writable files?", "completion": "find / -type f -perm -2"}
{"prompt": "How do I discover machines in the same network?", "completion": "nmap -sn <network_range>"}
{"prompt": "How can I check for scheduled tasks in Windows?", "completion": "schtasks /query"}
{"prompt": "How do I find the IP address of a remote server?", "completion": "nslookup <hostname>"}
{"prompt": "How do I gather system information on a Linux machine?", "completion": "uname -a"}
{"prompt": "How can I detect rootkits on a system?", "completion": "chkrootkit"}
{"prompt": "How do I find out what users are logged into a system?", "completion": "who" }
{"prompt": "How can I perform a SQL injection test?", "completion": "curl -X 'GET' '<target_url>' --data 'id=1' --header 'Host: <target_ip>'"}
{"prompt": "How can I dump a list of active users in Active Directory?", "completion": "net user /domain"}
{"prompt": "How do I perform a reverse DNS lookup?", "completion": "dig -x <ip_address>"}
{"prompt": "How do I brute force SMB login?", "completion": "nmap --script smb-brute <target_ip>"}
{"prompt": "How can I perform a vulnerability scan on a server?", "completion": "nikto -h <target_ip>"}
{"prompt": "How do I check the uptime of a Linux server?", "completion": "uptime"}
{"prompt": "How can I identify the version of a service?", "completion": "nmap -sV <target_ip>"}
{"prompt": "How do I extract metadata from an image file?", "completion": "exiftool <image_file>"}
{"prompt": "How can I check for weak passwords in a system?", "completion": "john --wordlist=<password_file> --rules <password_hash_file>"}
{"prompt": "How can I query for files modified recently?", "completion": "find / -type f -mtime -7"}
{"prompt": "How can I search for SSH login attempts?", "completion": "grep 'sshd' /var/log/auth.log"}
{"prompt": "How do I get information about a Windows machine?", "completion": "systeminfo"}
{"prompt": "How do I perform a ping sweep on a subnet?", "completion": "fping -a -g <subnet>"}
{"prompt": "How do I use netcat to listen on a port?", "completion": "nc -lvp <port>"}
{"prompt": "How can I collect information about a Windows service?", "completion": "sc qc <service_name>"}
{"prompt": "How can I discover web directories on a server?", "completion": "dirb <target_url>"}
{"prompt": "How do I check for failed login attempts?", "completion": "grep 'Failed password' /var/log/auth.log"}
{"prompt": "How can I identify the software running on a target server?", "completion": "nikto -h <target_ip>"}
{"prompt": "How can I list active user sessions on Linux?", "completion": "w"}
{"prompt": "How can I check for unpatched vulnerabilities on a system?", "completion": "openvas -h <target_ip>"}
{"prompt": "How can I perform a reconnaissance scan using Netcat?", "completion": "nc -v <target_ip> <port>"}
{"prompt": "How do I find a list of all mounted filesystems?", "completion": "mount | column -t"}
{"prompt": "How do I discover SMB shares on a Windows network?", "completion": "smbclient -L <target_ip> -U <user>"}
{"prompt": "How do I perform a brute force attack on HTTP basic auth?", "completion": "hydra -l <user> -P <password_list> <target_url> http-get" }
{"prompt": "How can I capture network traffic?", "completion": "tcpdump -i eth0 -w capture.pcap"}
{"prompt": "How do I check for suspicious cron jobs?", "completion": "crontab -l"}
{"prompt": "How can I discover network devices in my LAN?", "completion": "nmap -sn <network_range>"}
{"prompt": "How do I enumerate all the shares on a Windows system?", "completion": "net share"}
{"prompt": "How can I check the history of commands run on a Linux machine?", "completion": "cat ~/.bash_history"}
{"prompt": "How can I check for active RDP sessions?", "completion": "netstat -an | grep 3389"}
{"prompt": "How can I extract passwords from a Windows system?", "completion": "hashcat -m 1000 -a 0 <hash_file> <wordlist>"}
{"prompt": "How can I find unprotected FTP servers?", "completion": "nmap -p 21 --open <target_ip>"}
{"prompt": "How can I check for writable directories?", "completion": "find / -type d -perm -2"}
{"prompt": "How can I retrieve all the users from an LDAP directory?", "completion": "ldapsearch -x -b 'dc=example,dc=com' '(objectClass=person)'"}
{"prompt": "How can I check for clear-text passwords in configuration files?", "completion": "grep -r 'password' /etc"}
{"prompt": "How do I check for a possible MITM attack?", "completion": "netstat -an | grep <ip_address>"}
{"prompt": "How do I identify active network shares?", "completion": "smbclient -L <target_ip>"}
{"prompt": "How can I list all running Docker containers?", "completion": "docker ps"}
{"prompt": "How do I enumerate a domain for subdomains?", "completion": "dnsrecon -d <domain>"}
{"prompt": "How do I check for RCE vulnerabilities?", "completion": "curl -X 'GET' <target_url> --data 'id=1' --header 'Host: <target_ip>'"}
{"prompt": "How do I search for sensitive files in a web directory?", "completion": "dirb <target_url> -X .txt,.bak,.conf"}
{"prompt": "How can I search for exposed admin pages?", "completion": "dirbuster -u <target_url>/admin"}
{"prompt": "How can I check for broken symlinks?", "completion": "find / -type l -exec ls -l {} \; | grep 'No such file'"}
{"prompt": "How do I check for weak SSL/TLS configurations?", "completion": "openssl s_client -connect <target_ip>:443"}
{"prompt": "How do I find open MySQL databases?", "completion": "nmap -p 3306 --open <target_ip>"}
{"prompt": "How do I find out the DNS servers of a network?", "completion": "cat /etc/resolv.conf"}
{"prompt": "How do I check for unusual traffic patterns?", "completion": "tcpdump -i eth0 -nn"}
{"prompt": "How do I check for botnet activity?", "completion": "grep 'Connection refused' /var/log/syslog"}
{"prompt": "How do I check for vulnerability scanning tools on a network?", "completion": "nmap --script vuln <target_ip>"} |